Secure Routing for Mobile Ad hoc Networks

Secure Routing for Mobile Ad hoc Networks

THIRD QUARTER 2005, VOLUME 7, No. 3 | PATROKLOS G. ARGYROUDIS AND DONAL O'MAHONY
This article provides a comprehensive survey of secure ad hoc routing protocols for mobile wireless networks. Mobile ad hoc networks (MANETs) are characterized by rapidly changing topologies and lack centralized infrastructure, necessitating self-organized routing protocols. However, existing routing protocols often do not address security threats, such as malicious node behavior, which can disrupt network operations. The authors classify secure ad hoc routing protocols into five categories: asymmetric cryptography, symmetric cryptography, hybrid solutions, reputation-based solutions, and add-on mechanisms. They analyze the strengths and weaknesses of each category, focusing on their ability to counter specific attacks like location disclosure, black hole, replay, wormhole, blackmail, denial of service, and routing table poisoning. The article also presents detailed descriptions of several protocols, including ARAN, SRP, SEAD, Ariadne, SAODV, and SLSP, highlighting their mechanisms for authentication, integrity, and security. The analysis emphasizes the importance of balancing performance and security, and the need for robust solutions to protect against various types of attacks in MANETs.This article provides a comprehensive survey of secure ad hoc routing protocols for mobile wireless networks. Mobile ad hoc networks (MANETs) are characterized by rapidly changing topologies and lack centralized infrastructure, necessitating self-organized routing protocols. However, existing routing protocols often do not address security threats, such as malicious node behavior, which can disrupt network operations. The authors classify secure ad hoc routing protocols into five categories: asymmetric cryptography, symmetric cryptography, hybrid solutions, reputation-based solutions, and add-on mechanisms. They analyze the strengths and weaknesses of each category, focusing on their ability to counter specific attacks like location disclosure, black hole, replay, wormhole, blackmail, denial of service, and routing table poisoning. The article also presents detailed descriptions of several protocols, including ARAN, SRP, SEAD, Ariadne, SAODV, and SLSP, highlighting their mechanisms for authentication, integrity, and security. The analysis emphasizes the importance of balancing performance and security, and the need for robust solutions to protect against various types of attacks in MANETs.
Reach us at info@study.space
[slides] Secure routing for mobile ad hoc networks | StudySpace